background preloader

Advanced wizarding\

Facebook Twitter

How to Create Portable Version of Any Program in Windows Using Cameyo. Security Software | Convert your Windows Server 2008 to a Workstation! Blogs. Antivirus, Endpoint, Disk Encryption, Email and Web Security | Sophos. Video: Man-in-the-Middle – how it works |  InfoSec Institute – IT Training and Information Security Resources. This is a step-by-step video of the man-in-the-middle attack. We teach this and much more in our ethical hacking course. We’ll also teach you how to defend against such attacks. For a powerpoint diagram version of the man-in-the-middle attack you can go here.

Keatron, one of the two lead authors of "Chained Exploits: Advanced Hacking Attacks From Start to Finish", is a Senior Instructor and Training Services Director at InfoSec Institute. Keatron is regularly engaged in training and consulting for members of the United States intelligence community, military, and federal law enforcement agencies. Keatron specializes in penetration testing and digital forensics. Hack This Site! Information Awareness Office. The Information Awareness Office (IAO) was established by the Defense Advanced Research Projects Agency (DARPA) in January 2002 to bring together several DARPA projects focused on applying surveillance and information technology to track and monitor terrorists and other asymmetric threats to U.S. national security, by achieving "Total Information Awareness" (TIA).[4][5][6] This was achieved by creating enormous computer databases to gather and store the personal information of everyone in the United States, including personal e-mails, social networks, credit card records, phone calls, medical records, and numerous other sources, without any requirement for a search warrant.[7] This information was then analyzed to look for suspicious activities, connections between individuals, and "threats".[8] Additionally, the program included funding for biometric surveillance technologies that could identify and track individuals using surveillance cameras, and other methods.[8] History[edit]

HackerspaceWiki. Hackerspaces are community-operated physical places, where people can meet and work on their projects. This website is for Anyone and Everyone who wants to share their hackerspace stories and questions with the global hackerspaces community. Regular Events Call-in - Call-ins provide an opportunity for existing hackerspaces to provide an update and highlight upcoming events, and new/planned hackerspaces can ask questions. First Sunday each month. Resources Hackerspaces Blog: The Hackerspaces blog showcasing interesting projects and events around the world at hackerspaces. Web vulnerability scanners. SecTools.Org: Top 125 Network Security Tools For more than a decade, the Nmap Project has been cataloguing the network security community's favorite tools.

In 2011 this site became much more dynamic, offering ratings, reviews, searching, sorting, and a new tool suggestion form. This site allows open source and commercial tools on any platform, except those tools that we maintain (such as the Nmap Security Scanner, Ncat network connector, and Nping packet manipulator).

We're very impressed by the collective smarts of the security community and we highly recommend reading the whole list and investigating any tools you are unfamiliar with. Click any tool name for more details on that particular application, including the chance to read (and write) reviews. Many site elements are explained by tool tips if you hover your mouse over them. Enjoy! 20 tools (13) ★★★★★ Burp Suite (#13, Burp Suite is an integrated platform for attacking web applications.

. (7) ★★★★ Nikto (#14, (13) ★★★½ w3af (#18, new!) The Advanced Research Corporation ® How to secure your wireless network. Wireless networks are a wonderful invention. They give us the ability to easily deploy a complex network of computers without the need to physically wire them up. However, this ease of use can also mean that, without proper precautions, neighbourhood parasites can leech bandwidth and generally use your network against your wishes.

Trapping such people is easy with a little thought and some borrowed equipment. What is wireless? What's usually known as Wi-Fi belongs to a family of wireless networking technologies called IEE 802.11. These all use the same protocol for transmitting and receiving data over short distances. Home wireless routers and hubs (commonly called wireless access points) conform to the 802.11g variant of the specification. However, the useful data transmission rate is more like 19 Mbps, with the rest of the available bandwidth being used for error correction, encryption and packet collision detection. Wireless LANs operate on one of 13 channels. Encrypt to survive. Programr: Code, Compile & Run Programs In Your Browser. [www]~> TrackMeNot Prevents Data Profiling By Search Engines [Extension] How happy are you about search engines keeping tabs on your browsing behavior? Even though they say it’s to provide a better service and that they’ll take your information to the grave but never share it with anyone, it is nevertheless a fact that they know what you do online, how you do and when you do it.

So if you’re not in the sharing mood and you don’t want to reveal too much abut your browsing patterns try TrackMeNot extension for Firefox and Chrome which will send rouge queries from your browser to different search engines and make your pattern difficult for them to decipher. The extension comes preloaded with a whole bunch of queries like google,android,honda,data,ios lodsys android etc.

Random queries from the list are picked and sent at regular intervals defined by the user. The extension sends queries to AOL, Bing, Yahoo and Google. You can generate a log file to see which queries have been sent at what time and to which search engine. Install TrackMeNot Advertisement. Secure Firefox And Internet Explorer Browsing With G Data CloudSecurity. If your PC gets infected with malwares, spywares, and phishing scripts even in the presence of configured anti-virus internet security components, you should deploy an additional security layer for your web browsers to ensure system stability.

Since it’s not recommended to install more than one anti-malware software to protect system from malware, spyware, and phishing infested codes, you must use a dedicated security tool which looks for viruses, malwares, spywares, and security related vulnerabilities found in web pages. Similar to previously featured – TrafficeLight, G Data CloudSecurity is another web security tool which integrates into Firefox and Internet Explorer to protect you from malicious scripts. Before going into details. it’s worth mentioning here that it doesn’t erupt any sort of virus detection conflicts with other installed anti-virus suites nor does it disable any web-security functions of anti-phishing / anti-malware components of anti-virus.

Advertisement. TrackMeNot Prevents Data Profiling By Search Engines [Extension] URL X-ray: Find out where shortened URLs lead to without clicking. Silence Noisy Neighbors by Transmitting Your Music to Their Speakers. Welcome to Ansca Mobile's cross-platform mobile app development tool. BasicBuild your games or apps in record time and start monetizing with in-app purchases or ads.BUY $16/monthProPro adds advanced graphics, all Corona Plugins, analytics and much more.BUY $49/monthEnterpriseCall any native library (C++/Objective-C/Java) from your Corona app and do offline builds.CONTACT US Download Corona and you are automatically a Corona SDK Starter. You can build and publish your apps for free.Upgrade to Basic, Pro or Enterprise when you are ready for more functionality.

Do you have existing apps? CoronaCards lets you take Corona’s richness and ease-of-use to any native app. Read on to learn why Corona SDK is the leader for 2D apps and games… Publish to all major platforms Corona SDK allows you to publish for iOS, Android, Kindle Fire and NOOK from a single code base. We’ll take care of the heavy lifting related to device and platform fragmentation, allowing you to focus on creating exceptional mobile content. Build on industry standards. Website of Gopalakrishna Palem: Open source Tools & Articles by Gopalakrishna. ULTIMATE ANONYMITY, COMPLETE ONLINE ANONYMITY & PRIVACY SOLUTIONS.

Speak Up Lets You Read, Translate And Record Text With Ease. Why read the text on your computer when you can just listen to it? Text to speech applications come in handy in situations where you want to read large amounts of text. For instance, if you download an e-book, you might want to listen to text. Staring at the screen for long hours can also put stress on your eyes. However, you need a good text to speech tool to properly enjoy this feature. If you are in search of a text-to-speech application that can do more than just read text, give Speak Up a try. Speak Up is an open source, text-to-speech application that reads text, records speech, translates text using Google translator, allows you to toggle Windows Speech Recognition and record audio. Moreover, it lets you change the volume, rate of speech and add different male and female voices to listen to text.

Speak Up has the text Toolbar at the top, with Volume, Rate of Speech and Voices settings below it. Speak Up works on all version of Windows, and testing was done on Windows 7 64-bit. Steal Your Friends Passwords and Software Licenses! I’ll bet that headline got your attention! We all know that the purpose of computer passwords is to protect personal information that you’ve stored on your computer, and in your online accounts. With access to your passwords, cyber-criminals (they come in all shapes, sizes and flavors – so don’t be fooled), can and will, steal your identity and without a doubt severely compromise your financial security. Stolen passwords have the potential to cause serious havoc in your life. There are numerous ways of course that a password, or software license key, can be stolen.

Email scams: Email scams work because the cyber-crooks responsible use social engineering as the hook; in other words they exploit our curiosity to start the process of infecting unaware computer users’ machines Search engine redirection: Cyber-crooks continue to be unrelenting in their chase to infect web search results, seeding malicious websites among the top results returned by these engines. Drive-by downloads: Warriors of the Net. Antivirus, Endpoint, Disk Encryption, Email and Web Security | Sophos. Information technology consulting. Information technology consulting (also called IT consulting, computer consultancy, computing consultancy, technology consulting, business and technology services or IT advisory) is a field that focuses on advising businesses on how best to use information technology to meet their business objectives. In addition to providing advice, IT consultancies often estimate, manage, implement, deploy, and administer IT systems on businesses' behalf, known as outsourcing.

Overview[edit] The IT consulting industry can be viewed as a Four-tier system: There are different reasons why consultants are called in: To gain external, objective advice and recommendationsTo gain access to the consultants' specialized expertiseTemporary help during a one-time project where the hiring of a permanent employee(s) is not required or necessaryTo outsource all or part of the IT services from a specific company Prerequisites and major obstacles[edit] Project scoping and planning[edit] Project management support[edit]

Hacking Knowledge: 77 Ways to Learn Faster, Deeper, and Better. If someone granted you one wish, what do you imagine you would want out of life that you haven’t gotten yet? For many people, it would be self-improvement and knowledge. Newcounter knowledge is the backbone of society’s progress. Great thinkers such as Leonardo da Vinci, Thomas Edison, Benjamin Franklin, Albert Einstein, and others’ quests for knowledge have led society to many of the marvels we enjoy today. Your quest for knowledge doesn’t have to be as Earth-changing as Einstein’s, but it can be an important part of your life, leading to a new job, better pay, a new hobby, or simply knowledge for knowledge’s sake — whatever is important to you as an end goal.

Life-changing knowledge does typically require advanced learning techniques. In fact, it’s been said that the average adult only uses 10% of his/her brain. Health Shake a leg. Balance Sleep on it. Perspective and Focus Change your focus, part 2. Recall Techniques Listen to music. Visual Aids Every picture tells a story. Be engaging. InfoSec Institute – IT Training and Information Security Resources. How to be a better spy: Cyber security lessons from the recent russian spy arrests. On Monday, a number of Russian nationals got arrested for espionage against the US [1]. With all the talk and attention paid to cyber spies, spear phishing, APT and new high tech satellites and drones, it is almost refreshing to see that good old fashioned human spies are still used and apparently found valuable.

Skynet hasn't taken over quite yet. However, the story has a few neat cyber security lessons. Lesson 1: Encrypt your Wifi The spies evidently used WiFi networks to communicate. However, instead of all of them to connect to a particular access point, they established Ad-Hoc networks. This idea is interesting in so far as it does make remote surveillance of the connection a bit harder. As a "sub lesson" one may take away that you should change your MAC address as a spy to avoid tracking. One neat side effect of this meeting method: The participants of the meeting never had to acknowledge each other visibly. Lesson 2: Keep your password secure Lesson 3: Obscurity ! ------ Johannes B. Advanced Persistent Threat |  InfoSec Institute – IT Training and Information Security Resources. Jack is a Senior Instructor and Security Program Manager at InfoSec Institute, a provider of advanced ethical hacking training.

He regularly is called upon to train members of the United States intelligence community, military, and federal law enforcement agencies. Additionally, Jack provides training for Fortune 500 companies, such as Microsoft, HP and Citibank on how to better secure their networks and applications. When not teaching hacking classes, Jack regularly performs penetration tests and application security assessments for a number of clients.

He has years of private vulnerability development and exploitation experience for his customers and himself. Jack is the lead author of "The Shellcoder's Handbook: Discovering and Exploiting Security Holes". He is also the author of "Intrusion Detection with Snort", one of the best selling security books in its first year of publication, 2003. THE FARMER'S BOOT CD. Circumvent restrictions on CMD.exe or DOS prompt. The first step is to create the batch file. Create a new file on your desktop and name it "shell.cmd" or "dos.bat". Name it anything you like as long as the file extension ends in .cmd or .bat. Inside the file, put the following code: REM make all environment changes local to the execution of this script.SETLOCALREM show customized welcome message, version of Windows and a blank line@ECHO --== Welcome to your customized DOS Batch Shell ==--VERECHO.

REM create loop block where user is prompted for a command andREM that command is executed, displaying the results. :cmdloopREM Display working dir prompt, asking for a command. @set /p USERCMD=%CD%! :endREM end local environment changes@ENDLOCAL REM pause briefly before closing this window@pause. Nessus. OWASP Top 10 Tools and Tactics |  InfoSec Institute – IT Training and Information Security Resources. Circumvent internet tracking at work. Top Ten Free Wi-Fi Security Test Tools. DNS Hacking (Beginner to Advanced) |  InfoSec Institute – IT Training and Information Security Resources. Web vulnerability scanners. Web Application Exploits and Defenses. Burp Suite. VirusTotal - Free Online Virus, Malware and URL Scanner. Anonymous email. Use Your USB Stick As a Key to Boot Your Windows PC. Blogs. A Paranoid Guide to Google Data Privacy.